Description
The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.
Remediation
References
Related Vulnerabilities
WordPress Plugin Chameleon CSS SQL Injection (1.2)
PHP Improper Input Validation Vulnerability (CVE-2016-4537)
Atlassian Jira CVE-2021-26075 Vulnerability (CVE-2021-26075)
Oracle Database Server CVE-2014-6563 Vulnerability (CVE-2014-6563)
Jboss EAP Deserialization of Untrusted Data Vulnerability (CVE-2017-17485)